Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 4
Page No. 694 - 702

An Analytical Approach to Detect and Isolate Attacks in Mobile Adhoc Networks Using Cross Layer Feedback

Authors : G. Usha, S. Kannimuthu, M. Karthi and J. Joshua

References

Al-Shurman, M., S.M. Yoo and S. Park, 2004. Black hole attack in mobile Ad Hoc networks. Proceedings of the 42nd Annual Southeast Regional Conference, April 2-3, 2004, Huntsville, AL. USA., pp: 96-97.

Burbank, J.L., P.F. Chimento, B.K. Haberman and W.T. Kasch, 2006. Key challenges of military tactical networking and the elusive promise of MANET technology. IEEE Commun. Mag., 44: 39-45.
CrossRef  |  

Jaisankar, N., R. Saravanan and K.D. Swamy, 2010. A novel security approach for detecting black hole attack in MANET. Proceedings of the International Conference on Recent Trends in Business Administration and Information Processing, March 26-27, 2010, Thiruvananthapuram, India, pp: 217-223.

Joseph, J.F.C., A. Das, B.C. Seet and B.S. Lee, 2007. Cross layer versus single layer approaches for intrusion detection in MANETs. Proceedings of the 15th IEEE International Conference on Networks, November 19-21, 2007, Adelaide, SA., pp: 194-199.

Joseph, J.F.C., A. Das, B.C. Seet and B.S. Lee, 2008. CRADS: Integrated cross layer approach for detecting routing attacks in MANETs. Proceedings of the IEEE Wireless Communications and Networking Conference, March 31-April 3, 2008, Las Vegas, NV., USA., pp: 1525-1530.

Kannhavong, B., H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour, 2007. A survey of routing attacks in mobile Ad Hoc networks. IEEE Wireless Commun., 14: 85-91.
CrossRef  |  

Lu, S., L. Li, K.Y. Lam and L. Jia, 2009. SAODV: A MANET routing protocol that can withstand black hole attack. Proceedings of the International Conference on Computational Intelligence and Security, Volume 2, December 11-14, 2009, Beijing, China, pp: 421-425.

Milanovic, N., M. Malek, A. Davidson and V. Milutinovic, 2004. Routing and security in mobile ad hoc networks. Computer, 37: 61-65.
CrossRef  |  Direct Link  |  

Mistry, N., D.C. Jinwala and M. Zaveri, 2010. Improving AODV protocol against black hole attacks. Proceedings of the International MultiConference of Engineers and Computer Scientists, Volume 2, March 17-19, 2010, Hong Kong, pp: 1-6.

Nadeem, A. and M. Howarth, 2013. Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommun. Syst., 52: 2047-2058.
CrossRef  |  Direct Link  |  

Pranusha, A. and G. Murali, 2015. A hybrid key management scheme for secure MANET communications. Int. J. Res. Eng. Technol., 4: 38-40.
Direct Link  |  

Su, M.Y., 2011. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comp. Commun., 34: 107-117.
CrossRef  |  Direct Link  |  

Tamilselvan, L. and V. Sankaranarayanan, 2007. Prevention of blackhole attack in MANET. Proceedings of the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, August 27-30, 2007, Sydney, Australia, pp: 21-.

Thamilarasu, G. and R. Sridhar, 2012. A cross-layer game for energy-efficient Jamming detection in ad hoc networks. Secur. Commun. Networks, 5: 364-373.
CrossRef  |  

Yang, H., H. Luo, F. Ye, S. Lu and L. Zhang, 2004. Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Commun., 11: 38-47.
CrossRef  |  Direct Link  |  

Zhou, L. and Z.J. Haas, 1999. Securing Ad Hoc networks. IEEE Network, 13: 24-30.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved